Security Education for the new Generation
|
|
|
- Lillian Taylor
- 10 years ago
- Views:
Transcription
1 Security Education for the new Generation SESSION SESSION ID: ID: MASH-W02 Wednesday, Feb 26, 9:20 WEST 3018 Jacob West Chief Technology Officer HP Enterprise Security Products Matt Bishop Professor University of California, Davis
2 A Message from Matt Sorry I cannot be here! Jacob and I prepared the slides together, and have known each other for years. This talk represents our views. 2
3 Defining security State of play today Opportunities Existing resources 3 Conclusion
4 Security Stuff vs. Secure Stuff Security Stuff Responsible for security Focus on security activities Opportunities for apprenticeship Clear career path for the motivated Doing Stuff Securely Responsible for stuff Impact on security, but not focus Few opportunities to learn Hard to map interest to career
5 What Are We Talking About? Robust programming Programming that prevents abnormal termination or unexpected actions A secure program conforms to a security policy And implicitly requires robustness, but robust programming does not require such conformance Here, secure is used in the sense of robust
6 Why This Matters Example: Exploit a buffer overflow to force a program to do things it should not Definitely non-robust Does not handle invalid input properly Is it non-secure? That depends if one can Use the buffer overflow to do things that the security policy disallows (yes) Use the buffer overflow to do only things that I could already do (no)
7 Defining security State of play today Opportunities Existing resources 7 Conclusion
8 Problem: 84% of Breaches Target Software Networks Hardware Applications Security Measures Intellectual Property Switch/Router security Firewalls Customer NIPS/NIDS Data VPN Net-Forensics Anti-Virus/Anti-Spam Business DLP Processes Host FW Host IPS/IDS Trade Vuln. Assessment Secrets tools
9 Software Security Today The line between secure and insecure is often subtle Many seemingly non-security decisions impact security Small problems hurt a lot A single bad line of code can put a company in the news Smart people make dumb mistakes As a group, programmers repeat the same security mistakes over and over We need non-experts to get security right Security and development are both full time jobs
10 Becoming a Doctor years
11 Becoming a Programmer Enter Workforce 4 years Learn Everything On-the-Job Training? Certification?
12 Top 9 Undergraduate Computer Science Programs Required classes with security content Restricted electives with security content Restricted electives with security focus Berkeley Carnegie Mellon Cornell Georgia Tech Michigan MIT Stanford Illinois Austin
13 Top 9: Courses with Security as a Focus Junior/Seniors specialize Only 3 of 9 offer security track Cornell: Security & Trustworthy Systems Track (4 classes) Michigan: Security Track (4 classes) Austin: Information Security Certificate Program (5 classes) Berkeley Carnegie Mellon Graduate Cornell Georgia Michigan MIT Stanford Illinios Austin Undergraduate
14 Top 9: Courses Focus on Traditional Security Software security appears at 3 of 9 General Cryptography Network Web Forensics Software Mobile Privacy Policy/Risk
15 The Fundamental Problem We don t write software that is robust Some exceptions in special cases We don t build systems to meet security requirements Many different models for developing software
16 What Will Drive Improvement? Commercial Financial savings (avoid cleaning up messes) Simpler maintenance Improved reputation Government Financial savings (avoid cleaning up messes) Simpler maintenance National security Software liability?
17 Software Liability You can t say I m not responsible for anything Chain of distribution (e.g. supply chain) liability exists now You can limit liability somewhat by defining use and environment Then you re liable in that context but (probably) not in others It is coming... EULAs may not be enforceable (adhesion contracts)
18 So What s Holding Us Back? Commercial and Government Need to spend more money Longer time-to-market No legal liability for bad software Need to pay more attention to installation, maintenance, and use Lack of people to write good code
19 So What s Holding Us Back? Academia Robust coding not seen as integral to programming Textbooks loaded with examples of non-robust programming Lack of support for enforcing and grading for robust coding Ties into lack of graders who really know about this Lack of faculty who understand robust programming And intimidation factor for those who know they don t understand it
20 Lack of Resources Assurance costs! Industry expected to deliver secure, robust products without resources for the extra effort required to deliver them Academia expected to teach and reinforce robust programming without resources for the extra effort in supporting this
21 Lack of People Need to teach people how to write robust programming Need to emphasize the practice, both in education and industry Continuous practice is key to reinforcing, maintaining, extending skills
22 Defining security State of play today Opportunities Existing resources 27 Conclusion
23 Focus for Rest of Talk Everyone lacks resources! How can industry and government work with academia? Carrots, not sticks Security tuned to environment and use What is secure varies among companies and government organizations
24 What Do We Need to Teach Secure Programming? Summit on Education in Secure Software (SESS) Diana Burley The George Washington University Matt Bishop University of California at Davis Funded by NSF 60 participants: academia / industry / government nob.cs.ucdavis.edu/~bishop/notes/2011-sess/2011-sess.pdf
25 SESS Objectives Engage stakeholders from academia, industry, and government to discuss teaching secure programming Use discussion as basis for a collaborative effort to develop a comprehensive agenda for secure software education
26 Recommendations Increase faculty who understand the importance of secure coding Establish professional development opportunities for faculty Integrate computer security content into existing courses Provide faculty support for the inclusion of security content Require at least one computer security course for all college students
27 Recommendations Promote collaborative problem solving and solution sharing Encourage partnerships and collaborative curriculum development Use innovative teaching methods to strengthen the foundation of computer security knowledge Develop metrics to assess progress toward meeting educational goals Highlight the role that computer security professionals should play in key business decision making processes
28 Summary Holistic view of secure education suggests programmers and nonprogrammers alike must be educated in the core principles Structural enablers Cultural shift among faculty and industry stakeholders that supports the development of a holistic view of software security Identification of measurable objectives and corresponding measurements Development of national licensure programs Alignment of expectations for university education and realistic
29 What Can Academia Do? Include robustness in evaluation of programs and projects Create a secure programming clinic Like an English clinic, or a writing clinic for law schools Provide supplementary material for textbooks, classes These should emphasize robust programming
30 What Can Industry Do? Key is to show more than say secure development is important Make clear that the skills are important for hiring Mention their need in job openings Preference to those with skill in this also helps
31 Work With Students and Faculty Internships Students love these; good recruiting tool Tasks requiring robust programming emphasize its importance to students Help teach students Review students code Team with colleges in senior/capstone projects
32 What Will This Do? Increase student demand If students see it as important, they will ask about it in class, evaluate programs, faculty in part on it Increase your visibility Good recruiting tools A corporate good citizen
33 Government Support Act like an industry Government can also fund programs (e.g. DHS and the Software Assurance Curriculum Project) Programs should support future faculty (as well as engineers) People willing to commit to teaching Imperative: target funding towards this specific purpose Require funding to be used for supporting robust programming If done as adjunct, likely to disappear in the main purpose of the funding
34 Defining security State of play today Opportunities Existing resources 42 Conclusion
35 Existing Resources Industry academic enablement programs Tradeshows and conferences Competitions and contests Training and certification Specialized university programs
36 Industry Academic Enablement Programs Focused on facilitating university education in security Notable Programs Cisco IBM Delivery Methods Hewlett-Packard Microsoft Direct to students or young professionals with certification programs Define a methodology, enlist industry specialists to assist with delivery Collaborate with universities and non-profits on research
37 Tradeshows and Conferences Notable Conferences IEEE Symposium on Security and Privacy ACM Computer and Communications Security The Colloquium (Colloquium on Info. System Security Education) USENIX Security Symposium Goals Share advancements in research Enhance with curricula security-centric topics
38 Competitions and Contests Notable Competitions CyberPatriot National Collegiate Cyber Defense Competition UCSB ictf Cyber Security Awareness Week (CSAW) DEFCON Why Capture-the-Flag? Goal-oriented and rewards both participation and success Opportunity to network with peers and industry professionals
39 Training and Certification Notable Programs (ISC) 2 SANS Institute CompTIA Motivations and Objectives Industry effort to develop and ensure baseline skillsets Differentiate candidates for human resources and hiring managers Validate and recertify relevant security experience
40 Scholarship Programs Government Scholarships (for work commitment) CyberCorp: Scholarships for Service DOD Information Assurance Scholarship Program Private Scholarships (ISC) 2 Scholarships (Community College, Undergrad, Grad) Armed Forces Communications and Electronics Association (Community College, Undergrad, Grad) National Security Scholars Program (Undergrad) Symantec Graduate Fellowship (Grad) Applied Computer Security Associates (Undergrad, Grad)
41 Scholarship for Women Studying Information Security Support women with a demonstrated interest in security, through coursework, internships or work experience to complete a Bachelors or Masters degree Must be entering junior or senior year of Bachelors or first year of Masters Administered by Applied Computer Security Associates (ACSA) and Committee on the Status of Women in Computer Research (CRA-W) Awarded a single $10k scholarship annually pre-2014 Includes attendance at ACSA, CRAW, as well as internship opportunities
42 Defining security State of play today Opportunities Existing resources 71 Conclusion
43 Many Myths Myths about universities confuse how academia can put teaching secure programming into practice There is no room If students learn to write secure programs Academic institutions are We know what to do And some questionable ideas don t help either Testing students knowledge Unsupported mandates
44 Myth #1 There is no room in curricula for a course on secure programming You don t need a separate course Simply check programs submitted during all courses for robustness Make writing robust programs beneficial (through grades or other mechanisms) Provide resources so students can see how to do this, or get help to do it
45 Myth #2 If students learn to write secure programs, the state of software and system security will dramatically improve Will companies accept increased cost, time to market? Will customers pay higher prices, endure longer development times? Will students be encouraged (required) to practice what they learned?
46 Myth #3 Academic institutions are hierarchical in organization Implication is that deans, provosts, presidents can order this taught Learning styles, environments differ May not be a 'best' or 'right' way to teach this
47 Myth #4 We know what to do and how to do it We have ideas, but don t know Needed: research on education Needed: funding, people to do this The Summit on Education in Secure Software suggested ways to do this SESS results are general Approaches must be tailored to various environments
48 Questionable Idea #1 Testing students knowledge Who creates the tests? Who is being tested? How do you know that you are testing what is important? (that is, the right thing ) Who determines what is an acceptable result? Teaching to the test, rather than to learn the material
49 Questionable Idea #2 Unsupported mandates The support has to come from somewhere It s like a zero-sum game What do you want to weaken? If you only have so many resources, something will have to give You don t want to weaken the core foundation of understanding why certain programming paradigms are critical
50 Conclusion We must all hang together, or we shall all hang separately. - Benjamin Franklin The state of practice can, and must, change Understand that academia is a different environment completely Teaching robust programming, and nothing more, will not help The marketplace must also change, as must current practice The public will be the main driver (unfortunately, probably with lawsuits)
51 Questions? SESSION ID: Jacob West Chief Technology Officer HP Enterprise Security Products Matt Bishop Professor University of California, Davis
Secure Programming: A Way of Life (or Death) Matt Bishop Computer Security Laboratory Dept. of Computer Science University of California at Davis
Secure Programming: A Way of Life (or Death) Matt Bishop Disclaimer ä All opinions expressed here are not necessarily those of the: ä ä Department of Computer Science ä University of California ä Any other
HP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
College of Business. 2014 AACSB Continuous Improvement Review Accreditation Report
College of Business 2014 AACSB Continuous Improvement Review Accreditation Report Accreditation Review Result Accreditation extended for another five years Next review occurs in the 2019 2020 academic
Graduate Program Review of EE and CS
Graduate Program Review of EE and CS The site visit for the Graduate Program Review of Electrical Engineering and Computer Science took place on April 3-4. It included meetings with many constituencies
Proposal for Differential Tuition Dwight Look College of Engineering Texas A&M University November 2010
Proposal for Differential Tuition Dwight Look College of Engineering Texas A&M University November 2010 Background The Dwight Look College of Engineering is very highly ranked and is the second largest
M.S. in Computational Finance and Risk Management University of Washington Seattle
May 2011 M.S. in Computational Finance and Risk Management University of Washington Seattle Introduction University of Washington (UW) proposes to offer a Master of Science in Computational Finance and
HR 2272 Conference Report STEM Education Provisions Summary
HR 2272 Conference Report STEM Education Provisions Summary Title I Office of Science and Technology Policy (OSTP) Directs the President to convene a National Science and Technology Summit not more than
Link to University's Strategic Plan (Strategy #) Goal 1.1 Strategy 1.1.1
Mission Statement: The mission of the College of Engineering is to provide an innovative academic program of excellence at both the undergraduate and graduate levels, judged by the highest standards in
COMING TOGETHER, ENVISIONING THE FUTURE: THE STRATEGIC PLAN OF THE DEPARTMENT OF COMMUNICATION, UNIVERSITY OF MARYLAND
COMING TOGETHER, ENVISIONING THE FUTURE: THE STRATEGIC PLAN OF THE DEPARTMENT OF COMMUNICATION, UNIVERSITY OF MARYLAND CONTENTS INTRODUCTION 1 MISSION & VISION 1 STRENGTHS, CONSTRAINTS, OPPORTUNITIES 2
Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities
Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities Dr. Ashutosh Dutta, Ph.D. Lead Scientist, AT&T New Jersey, USA Email: [email protected] Realization of Your Dream
Draft. Graduate Education Strategic Plan. Contents. DRAFT September 29, 2014
Graduate Education Strategic Plan Contents Vision... 3 Mission... 3 Guiding Principles... 3 Graduate Education at Georgia Tech... 4 Strategic Goals... 5 Goal 1: Deliver an educational experience that is
Dr. James R. Lumpkin, Dean
EXECUTIVE SUMMARY College of Business Louisiana Tech University Dr. James R. Lumpkin, Dean EXECUTIVE SUMMARY Overview Louisiana Tech University The Industrial Institute and College of Louisiana was founded
Participants: Introduction:
National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS
Evolving Modalities for Doctoral Education
Evolving Modalities for Doctoral Education Charles McClintock Dean, Human & Organizational Development Fielding Graduate University Orlando L. Taylor President, Washington, DC Campus The Chicago School
Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce
Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Benjamin Scribner Department of (DHS) National Cybersecurity Education & Awareness Branch (CE&A) October 2014 Mid-South
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
Becoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
Discover Viterbi: Cyber Security Engineering & Informatics Programs
Discover Viterbi: Cyber Security Engineering & Informatics Programs Professor Cyrus Shahabi Professor Clifford Neuman Meghan Balding Graduate & Professional Programs November 11, 2015 WebEx Quick Facts
BEST PRACTICES FOR BUSINESS SCHOOLS TO LEAD IN EXPANDING OPPORTUNTIES FOR WOMEN IN BUSINESS AND TO ADAPT TO THE 21 ST -CENTURY WORKFORCE
BEST PRACTICES FOR BUSINESS SCHOOLS TO LEAD IN EXPANDING OPPORTUNTIES FOR WOMEN IN BUSINESS AND TO ADAPT TO THE 21 ST -CENTURY WORKFORCE In order to identify strategies and best practices to better prepare
Graduate School Infosession Day One with Dr. Sheila Humphreys and Professor Mike Franklin
Graduate School Infosession Day One with Dr. Sheila Humphreys and Professor Mike Franklin =============================================== Resources available to you for applying to graduate school. ===============================================
MASTER S VS. PH.D. WHICH ONE TO CHOOSE? HOW FAR TO GO? A.J. Brush, Microsoft Research Rita H. Wouhaybi, Intel Labs
MASTER S VS. PH.D. WHICH ONE TO CHOOSE? HOW FAR TO GO? A.J. Brush, Microsoft Research Rita H. Wouhaybi, Intel Labs Revisi:ng Choices Nearing the end of your first year in either a Ph.D. or MS program,
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
PhDs in Business. Working at the Frontiers of New Knowledge
PhDs in Business Working at the Frontiers of New Knowledge The primary source of this document came from a presentation at the University of Southern California for a Doctorate in Business Recruiting Forum
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
The GW CyberCorps Program
The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks
NLN VISION: TRANSFORMING RESEARCH IN NURSING EDUCATION A Living Document from the National League for Nursing. NLN Board of Governors November 2012
NLN VISION: TRANSFORMING RESEARCH IN NURSING EDUCATION A Living Document from the National League for Nursing NLN Board of Governors November 2012 Purpose The health of the nation through improved patient
Computer and Network Security in Higher Education
The Authors Computer and Network Security in Higher Education Mark Luker and Rodney Petersen, Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass, A Wiley Company.
How To Become A Security Professional
Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided
MAYS BUSINESS SCHOOL STRATEGIC PLAN 2010
MAYS BUSINESS SCHOOL STRATEGIC PLAN 2010 STRATEGIC PLANNING PROCESS Our strategic planning process is driven by the mission of Mays Business School, which is to create knowledge and develop future ethical
AC 2012-5061: EXPLORING THE DIVERSITY IN FACULTY CAREERS: FORMATIVE AND SUMMATIVE ASSESSMENT IN A PREPARING FU- TURE FACULTY COURSE
AC 2012-5061: EXPLORING THE DIVERSITY IN FACULTY CAREERS: FORMATIVE AND SUMMATIVE ASSESSMENT IN A PREPARING FU- TURE FACULTY COURSE Ms. Cyndi Lynch, Purdue University, West Lafayette Cyndi Lynch is the
Graduate Program Goals Statements School of Social Work College of Education and Human Development
Graduate Program Goals Statements School of Social Work College of Education and Human Development December 12, 2014 Program Youth Development Leadership (MEd) Master of Social Work (MSW) Doctorate in
Evaluation of Intellectual Property Course Offerings for undergraduate engineering students in the Mid Atlantic Region
Evaluation of Intellectual Property Course Offerings for undergraduate engineering students in the Mid Atlantic Region Abstract S. Jimmy Gandhi, M.S, Stevens Institute of Technology Donald Merino, PhD,
HUMAN RESOURCE MANAGEMENT AND DEVELOPMENT
NEW YORK UNIVERSITY SCHOOL OF CONTINUING AND PROFESSIONAL STUDIES MASTER OF SCIENCE IN HUMAN RESOURCE MANAGEMENT AND DEVELOPMENT DIVISION OF PROGRAMS IN BUSINESS MASTER OF SCIENCE IN HUMAN RESOURCE MANAGEMENT
Comparative Analysis of PhD programs in Engineering Education
Paper ID #13515 Comparative Analysis of PhD programs in Engineering Education Mr. Homero Gregorio Murzi, Virginia Tech PhD. student of Engineering Education at Virginia Tech. Mr. Prateek Shekhar, University
PH.D. IN BUSINESS ADMINISTRATION
PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent
Master of Cyber Security
Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides
OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF NURSING
OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF NURSING Oakland University seeks an inspiring and visionary leader to serve as Dean of the School of Nursing. The Search Committee will begin reviewing applications
A Guide to applying to US CS PhD programs for EngSci/ECE
A Guide to applying to US CS PhD programs for EngSci/ECE Sida Wang Nov, 2011 1 Why this guide? This guide dedicated to Toronto Engineering Science (EngSci) and ECE undergraduates who wants to apply to
The School of Education & Human Services The University of Michigan Flint Standards and Criteria for Promotion and Tenure
The School of Education & Human Services The University of Michigan Flint Standards and Criteria for Promotion and Tenure Introduction The primary mission of the University of Michigan Flint is to be the
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
27.9% of the graduates responded. Respondents. Degree Surveys with Salaries Male Average Female Average. Table of Contents
27.9% of the graduates responded Class # of Respondents % Males % Females Seniors 145 73.1% 26.9% Average Yearly Salary Salary Range Overall $125,457 $40,000 500,000 Male $132,434 $40,000 500,000 Female
Fast-track to Developing Supply Chain Management Professionals
Fast-track to Developing Supply Chain Management Professionals Speaker: Scott Reily Senior Vice President Logistics, Brookshire Grocery Company Speaker: Mark R. Miller, PhD, CLSSBB, CSTM, CSMS, CSEG Professor
University of Connecticut (Storrs & Regionals)
University of Connecticut (Storrs & Regionals) Summary of Recommended Institutional Fees Fiscal Years 2013-2014 Institutional fees require central administrative review and approval. The budgets for the
Request for Entitlement to Plan Bachelor of Science in Supply Chain Management University of Wisconsin Stout September 2008
1. What is the need for this program? Request for Entitlement to Plan Bachelor of Science in Supply Chain Management University of Wisconsin Stout September 2008 Businesses are requiring specialized skills
Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration*
Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration* University of North Texas (UNT) received a NSF award to provide scholarships, including stipends, tuition, health insurance,
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
Toward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015
Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015 Final Version 5.0: May 3, 2010 Computer science is a discipline that involves the understanding and design of
MASTER OF ARTS DEGREE PROGRAMS
COLLEGE OF VISUAL ARTS AND DESIGN Department of Art Education and Art History MASTER OF ARTS DEGREE PROGRAMS Master of Arts in Art Education Master of Arts in Art History REQUIRED ACADEMIC BACKGROUND The
NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
CONNECTING CAREER AND TECHNICAL EDUCATION WITH THE COLLEGE AND CAREER READINESS AGENDA
Introduction Policymakers and educators around the nation are wrestling with an important challenge how to raise expectations for high school achievement, while increasing relevance and engagement in learning
Doctor of Philosophy (Ph.D.) in Art Education
COLLEGE OF VISUAL ARTS AND DESIGN Department of Art Education and Art History Doctor of Philosophy (Ph.D.) in Art Education A Ph.D. in art education gives one the opportunity to achieve a high level of
Summit on Education in Secure Software Final Report
Summit on Education in Secure Software Final Report Dr. Diana L. Burley The George Washington University Dr. Matt Bishop University of California, Davis GW: UCD: Report GW-CSPRI-2011-7 Technical Report
Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
Master s Degree Programs. Global Technology Leadership
Master s Degree Programs Global Technology Leadership Why BU? Consistently ranked among the most prestigious graduate engineering programs in the U.S. Study with the Best Work with renowned faculty and
MSU College of Engineering, Fall 2015
MSU College of Engineering, Fall 2015 ADGS BAE BME CHEM S CEE CMSE CSE ECE ME 1 Director for Graduate Initiatives, College of Engineering Recruit new graduate students to MSU Engineering Coordinate summer
DIFFERENTIAL TUITION REQUEST
Page 203 of 342 University: UNIVERSITY OF ARIZONA DIFFERENTIAL TUITION REQUEST College/School: Program: College of Architecture and Landscape Architecture Bachelor of Architecture Is this for the graduate
Statement of. William D. Green. Executive Chairman of the Board, Accenture. and
Statement of William D. Green Executive Chairman of the Board, Accenture and Member, Committee on Research Universities Board on Higher Education and Workforce Policy and Global Affairs National Research
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
Exploring a National Cyber Security Exercise for Community Colleges
Exploring a National Cyber Security Exercise for Community Colleges Casey W. O'Brien Co-PI, CyberWatch Center Community College of Baltimore County Baltimore, Maryland :: CyberWatch :: Current Cyber Exercise
The University of California at Berkeley. A Brief Overview July 2007 For Presentation in Tokyo by Professor Stephen Cohen
The University of California at Berkeley. A Brief Overview July 2007 For Presentation in Tokyo by Professor Stephen Cohen 1 Universities Ranked by Number of Graduate Departments in Top 10 1. Berkeley (35)
Celebrating Partnerships: 2015 NACME Continuum Meeting
Celebrating Partnerships: 2015 NACME Continuum Meeting Falls Church Marriott, Fairview Park Falls Church, VA October 13-14, 2015 Corporate Sponsor 2 Scholarship Program (2010-2015) Purpose Increase awareness
Academic and Professional Degree Students
Accountability Subreport on Academic and Professional Degree Students Steven Beckwith Vice President for Research & Graduate Studies Graduate Studies at UC Under the Master Plan, UC is responsible for
Applying to Graduate School Frequently Asked Questions 1. What are the differences between Master s, PhD, and MFA programs?
1 Applying to Graduate School Frequently Asked Questions 1. What are the differences between Master s, PhD, and MFA programs? The main difference between master s and doctoral programs has to do with the
SCHOOL OF BUSINESS STATE UNIVERSITY OF NEW YORK AT NEW PALTZ
SCHOOL OF BUSINESS STATE UNIVERSITY OF NEW YORK AT NEW PALTZ Five-Year Strategic Plan Revised June 1, 2008 by Chih-Yang Tsai, Associate Dean This strategic plan for the School of Business is the result
Our Mission To provide leadership, resources, and support for academically rigorous graduate study. *************
Our Vision To serve as a model unit of support, service, and stewardship of excellence in graduate education to meet the intellectual, academic, and vocational needs of students in the region and beyond.
Journal of Homeland Security and Emergency Management
Journal of Homeland Security and Emergency Management Volume 8, Issue 2 2011 Article 9 FUTURE OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT EDUCATION Professional Education for Emergency Managers William
Employee Surveys: Four Do s and Don ts. Alec Levenson
Employee Surveys: Four Do s and Don ts Alec Levenson Center for Effective Organizations University of Southern California 3415 S. Figueroa Street, DCC 200 Los Angeles, CA 90089 USA Phone: 1-213-740-9814
STATE OF IOWA JUNE 8, 2011 UNDERGRADUATE AND GRADUATE PROGRAMS IN THE COLLEGE OF BUSINESS ACCREDITATION REPORT AT IOWA STATE UNIVERSITY
STATE OF IOWA JUNE 8, 2011 Contact: Diana Gonzalez UNDERGRADUATE AND GRADUATE PROGRAMS IN THE COLLEGE OF BUSINESS ACCREDITATION REPORT AT IOWA STATE UNIVERSITY Action Requested: Receive the accreditation
School of Accounting Florida International University Strategic Plan 2012-2017
School of Accounting Florida International University Strategic Plan 2012-2017 As Florida International University implements its Worlds Ahead strategic plan, the School of Accounting (SOA) will pursue
DEAN OF THE SCHOOL OF HEALTH SCIENCES
OAKLAND UNIVERSITY DEAN OF THE SCHOOL OF HEALTH SCIENCES Oakland University seeks an inspiring and visionary leader to serve as Dean of the School of Health Sciences. The Search Committee will begin reviewing
TO MEMBERS OF THE COMMITTEE ON EDUCATIONAL POLICY: DISCUSSION ITEM FUNDING UNIVERSITY OF CALIFORNIA GRADUATE ACADEMIC STUDENTS EXECUTIVE SUMMARY
E2 Office of the President TO MEMBERS OF THE COMMITTEE ON EDUCATIONAL POLICY: For Meeting of DISCUSSION ITEM FUNDING UNIVERSITY OF CALIFORNIA GRADUATE ACADEMIC STUDENTS EXECUTIVE SUMMARY There has been
Systems Engineering Beyond Aerospace and Defense
Systems Engineering Beyond Aerospace and Defense Don S. Gelosh Ph.D., CSEP-Acq. White Paper Systems Engineering Beyond Aerospace and Defense By Don S. Gelosh, Ph.D., CSEP-Acq. Director, Systems Engineering
An Integrated Process Safety Curriculum: It s more than just technical content! Outline of Talk
An Integrated Process Safety Curriculum: It s more than just technical content! Daniel A. Crowl Herbert H. Dow Professor for Chemical Process Safety Department of Chemical Engineering Michigan Technological
